General

  • Target

    87f02f971e6c0925f36b48912eee5df4_JaffaCakes118

  • Size

    273KB

  • Sample

    241102-1mr9qswfnb

  • MD5

    87f02f971e6c0925f36b48912eee5df4

  • SHA1

    30be3fb266531e04d22d92cc4034a0b0380bfaeb

  • SHA256

    d8e1d628d41a7ec46b1fd2c68be1ae3eb8a43ea63a6820ea28bb8b746ec8ff6d

  • SHA512

    dc92861f8d69b4679987c0778b316841ffbbcafc90de434d1cebb6f2b8d085e16bb0a696bed60ee5defa75dbf890aa1782c8bb296727b2d7c50ac21669127993

  • SSDEEP

    6144:ahfANY9etDofluVdSCfVicJPm6l+CSRg3qvofm2evUEeyMb:qIrHTTNm4+3Rg3BmBvSb

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

mile404.no-ip.info:1604

Mutex

DC_MUTEX-U6BQSZ0

Attributes
  • InstallPath

    System\taskhost.exe

  • gencode

    MoHQLCL0MMAD

  • install

    true

  • offline_keylogger

    true

  • password

    Funnel5266

  • persistence

    false

  • reg_key

    taskhost

Targets

    • Target

      87f02f971e6c0925f36b48912eee5df4_JaffaCakes118

    • Size

      273KB

    • MD5

      87f02f971e6c0925f36b48912eee5df4

    • SHA1

      30be3fb266531e04d22d92cc4034a0b0380bfaeb

    • SHA256

      d8e1d628d41a7ec46b1fd2c68be1ae3eb8a43ea63a6820ea28bb8b746ec8ff6d

    • SHA512

      dc92861f8d69b4679987c0778b316841ffbbcafc90de434d1cebb6f2b8d085e16bb0a696bed60ee5defa75dbf890aa1782c8bb296727b2d7c50ac21669127993

    • SSDEEP

      6144:ahfANY9etDofluVdSCfVicJPm6l+CSRg3qvofm2evUEeyMb:qIrHTTNm4+3Rg3BmBvSb

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Modifies WinLogon for persistence

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks